Otwarty dostęp

Predicting the Consequences of Perceived Data Privacy Risks on Consumer Behaviour: An Entropy-TOPSIS Approach


Zacytuj

1. Abidin, M. Z., Rusli, R., and Shariff, A. M. Technique for Order Performance by Similarity to Ideal Solution (TOPSIS)-entropy Methodology for inherent Safety Design Decision Making tool. Procedia Engineering, 148, 2016, pp. 1043–1050. https://doi:10.1016/j.proeng.2016.06.58710.1016/j.proeng.2016.06.587 Search in Google Scholar

2. Acquisti, A., Brandimarte, L., and Loewenstein, G. Privacy and Human Behavior in the age of Information. Science, 347, 2015, pp. 509–514. https://doi:10.1126/science.aaa146510.1126/science.aaa1465 Search in Google Scholar

3. Acquisti, A., Sleeper, M., Wang, Y., Wilson, S., Adjerid, I., Balebako, R., and Schaub, F. Nudges for Privacy and Security. ACM Computing Surveys, 50(3), 2017, pp. 1–41. https://doi:10.1145/305492610.1145/3054926 Search in Google Scholar

4. Adam J., Ulf-Dietrich R., Tom B., Carina B., and Paine S. Privacy, Trust, and Self-disclosure Online. Human-Computer Interaction, 25(1), 2010, pp. 1-24. https://doi:10.1080/0737002090356662.10.1080/07370020903586662 Search in Google Scholar

5. Albahri, A. S., Hamid, R. A., Albahri, O.S, Albahri, A.S. and Zaidan, A.A. Detection-based prioritisation: Framework of Multi-laboratory Characteristics for Asymptomatic COVID-19 carriers based on integrated Entropy–TOPSIS methods. Artificial Intelligence in Medicine, 101983. 2021. https://doi:10.1016/j.artmed.2020.10198310.1016/j.artmed.2020.101983 Search in Google Scholar

6. Alhakami, A. S., and Slovic, P. A Psychological Study of the Inverse Relationship between Perceived Risk and Perceived Benefit. Risk Analysis, 14(6), 1994, pp. 1085–1096.10.1111/j.1539-6924.1994.tb00080.x Search in Google Scholar

7. Alshurideh, M., Nicholson, M., and Xiao, S. The Effect of Previous Experience on Mobile Subscribers’ Repeat Purchase Behaviour. European Journal of Social Sciences, 30(3), 2012, pp. 366-376. Search in Google Scholar

8. Analytics Insight. Data protection vs. Cybersecurity: why you need both. 2020. [Blog post]. Retrieved from https://www.analyticsinsight.net/data-protection-vs-cyber-security-why-you-need-both/ Search in Google Scholar

9. Awad, N. F., and Krishnan, M. S. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization. MIS Quarterly, 2006, pp. 13-28. https://doi:10.2307/2514871510.2307/25148715 Search in Google Scholar

10. Baker Hosetler, Is Your Organization Compromise Ready? Data Security Incident. 2016. Response Report. Retrieved September 3, 2021, from https://www.bakerlaw.com/files/uploads/Documents/Privacy/2016-Data-Security-Incident-ResponseReport.pdf Search in Google Scholar

11. Bansal, G. and Gefen, D. The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online. Decision support systems, 49(2), 2010, pp. 138-150. https://doi:10.1016/j.dss.2010.01.01010.1016/j.dss.2010.01.010 Search in Google Scholar

12. Barari, M., Ross, M., and Surachartkumtonkun, J. Negative and Positive Customer Shopping Experience in an Online Context. Journal of Retailing and Consumer Services, 53, 2020. https://doi:10.1016/j.jretconser.2019.10110.1016/j.jretconser.2019.101985 Search in Google Scholar

13. Bélanger, F., and Crossler, R. E. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Quarterly, 2011, pp.1017-1041. https://doi.org/10.2307/41409971 Search in Google Scholar

14. Belanger, F. and Hiller, J. S. A Framework for E-Government: Privacy Implications. Business Process Management Journal, 12(1), 2006, pp. 48–60. https://doi:10.1108/1463715061064375110.1108/14637150610643751 Search in Google Scholar

15. Belanger, F., Hiller, J. S., & Smith, W. J. Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes. The Journal of Strategic Information Systems, 11(3-4), 2002, pp. 245 – 270. https://doi:10.1016/s0963-8687(02)00018-510.1016/S0963-8687(02)00018-5 Search in Google Scholar

16. Bellman, S., Johnson, E. J., Kobrin, S. J., and Lohse, G. L. International Differences in Information Privacy Concerns: A Global Survey of Consumers. The Information Society, 20(5), 2004, pp. 313 – 324.10.1080/01972240490507956 Search in Google Scholar

17. Bleier, A., and Eisenbeiss, M. The Importance of Trust for Personalized Online Advertising. Journal of Retailing, 91(3), 2015, pp. 390–409. https://doi:10.1016/j.jretai.2015.04.00110.1016/j.jretai.2015.04.001 Search in Google Scholar

18. Bornschein, R., Schmidt, L., and Maier, E. The Effect of Consumers’ Perceived Power and Risk in Digital Information Privacy: The Example of Cookie Notices. Journal of Public Policy & Marketing, 39(2), 2020, pp. 135–154. https://doi:10.1177/074391562090214310.1177/0743915620902143 Search in Google Scholar

19. Bugeja, J., Jacobsson, A., and Davidsson, P. On privacy and Security Challenges in Smart Connected Homes. European Intelligence and Security Informatics Conference (EISIC). 2016. https://doi:10.1109/eisic.2016.04410.1109/EISIC.2016.044 Search in Google Scholar

20. Conner, M. and Armitage, C. J. Extending the Theory of Planned Behavior: A Review and Avenues for Further Research. Journal of Applied Social Psychology, 28(15), 1998, pp. 1429–1464. https://doi:10.1111/j.1559-1816.1998.tb01685.x10.1111/j.1559-1816.1998.tb01685.x Search in Google Scholar

21. Culnan, M. J. and Armstrong, P. K. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 1999, pp. 104–115. https://doi:10.1287/orsc.10.1.10410.1287/orsc.10.1.104 Search in Google Scholar

22. Culnan, M. J., and Bies, R. J. Consumer Privacy: Balancing Economic and Justice Considerations. Journal of Social Issues, 59(2), 2003, pp. 323–342. https://doi:10.1111/1540-4560.0006710.1111/1540-4560.00067 Search in Google Scholar

23. Davis, F. D., Bagozzi, R. P., and Warshaw, P. R. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science, 35(8), 1989, pp. 982–1003. https://doi:10.1287/mnsc.35.8.98210.1287/mnsc.35.8.982 Search in Google Scholar

24. Deloitte. Enterprise@Risk: Privacy & Data Protection Survey. 2007, Retrieved from http://www.deloitte.com/dtt/cda/doc/content/us_risk_s%26P_2007%20Privacy10Dec2007final.pdf. Search in Google Scholar

25. Dinev, T. and Hart, P. Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact. International Journal of Electronic Commerce, 10(2), 2005, pp. 7–29. https://doi:10.2753/jec1086-441510020110.2753/JEC1086-4415100201 Search in Google Scholar

26. Dinev, T., and Hart, P. An Extended Privacy Calculus Model for E-commerce Transactions. Information Systems Research, 17(1), 2006, pp. 61–80. https://doi:10.1287/isre.1060.008010.1287/isre.1060.0080 Search in Google Scholar

27. Dontov, T. Why Data Protection, and Cybersecurity can’t be Separate Functions. 2020, November 25, Retrieved from https://www.forbes.com/sites/theyec/2020/11/25/why-dataprotection-andcybersecurity-cant-be-separate-functions/?sh=7fad4b2517cc Search in Google Scholar

28. Federal Trade Commission. Data Brokers: A call for transparency and accountability. FTC. 2014. Retrieved from https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparencyaccountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf Search in Google Scholar

29. Fortes, N. and Rita, P. Privacy Concerns and Online Purchasing Behaviour: Towards an Integrated Model. European Research on Management and Business Economics, 22(3), 2016, pp. 167–176. http://doi:10.1016/j.iedeen.2016.04.00210.1016/j.iedeen.2016.04.002 Search in Google Scholar

30. Gomez, J., Pinnick, T., and Soltani, A. Know Privacy: The Current State of Web Privacy, Data Collection, and Information Sharing, 2009. School of Information, University of California Berkeley (http://www.knowprivacy.org/). Search in Google Scholar

31. Guhr, N., Werth, O., Blacha, P. P. H., and Breitner, M. H. Privacy Concerns in the Smart Home Context. SN Applied Sciences, 2(2), 2020, pp. 1-12. https://doi.org/10.1007/s42452-020-2025-8 Search in Google Scholar

32. Hill, R. J., Fishbein, M. and Ajzen, I. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Contemporary Sociology, 6(2), 1977, pp. 244. http://doi:10.2307/206585310.2307/2065853 Search in Google Scholar

33. Hoffmann, C. P., Lutz, C., and Meckel, M. (2014). Digital Natives or Digital Immigrants? The Impact of User Characteristics on Online Trust. Journal of Management Information Systems, 31(3), pp. 138-171. https://doi.org/10.1080/07421222.2014.995538 Search in Google Scholar

34. Hwang, C. L. and Yoon, K. Multiple Attribute Decision Making: A State of the Art Survey. Lecture Notes in Economics and Mathematical Systems, 186(1), 1981.10.1007/978-3-642-48318-9_1 Search in Google Scholar

35. Jeff Smith, H., Dinev, T. and Xu, H. Information Privacy Research: An Interdisciplinary Review. MIS Quarterly: Management Information Systems, 35(4), 2011, pp. 989–1015.10.2307/41409970 Search in Google Scholar

36. Jensen, C., Potts, C., and Jensen, C. Privacy Practices of Internet Users: Self-reports Versus Observed Behavior. International Journal of Human-Computer Studies, 63(1-2), 2005, pp. 203–227.10.1016/j.ijhcs.2005.04.019 Search in Google Scholar

37. Kehr, F., Kowatsch, T., Wentzel, D. and Fleisch, E. Blissfully Ignorant: The Effects of General Privacy Concerns, General Institutional Trust, and Affect in the Privacy Calculus. Information Systems Journal, 25(6), 2015, pp. 607–635. http://doi:10.1111/isj.1206210.1111/isj.12062 Search in Google Scholar

38. Kim, D. J., Ferrin, D. L. and Rao, H. R. A Trust-Based Consumer Decision-Making Model in Electronic Commerce: The Role of Trust, Perceived Risk, and Their Antecedents. Decision Support Systems, 44(2), 2008, pp. 544–564. http://doi:10.1016/j.dss.2007.07.00110.1016/j.dss.2007.07.001 Search in Google Scholar

39. Kim, K. [Blog post]. Retrieved from https://www.usatoday.com/story/tech/columnist/2019/12/19/your-smartphone-mobile-device-may-recording-everything-you-say/4403829002/ 2019, December, 19 Search in Google Scholar

40. Kothari, C.R. Research methodology: Methods and techniques (2nd ed.). New Age International Publishers. 2004. Search in Google Scholar

41. Kuanchin Chen and Alan I. Rea Jr. Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques, Journal of Computer Information Systems, 44(4), 2004, pp. 85-92. http://dx.doi.org/10.1080/08874417.2004.11647599 Search in Google Scholar

42. LaRose, R., and Rifon, N. Your Privacy is Assured of Being Disturbed: Websites with and without Privacy Seals. New Media & Society, 8(6), 2006, pp. 1009–1029.10.1177/1461444806069652 Search in Google Scholar

43. Leidner, D. E., and Kayworth, T. A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict. MIS Quarterly, 2006, pp. 357-399. http://doi:10.2307/2514873510.2307/25148735 Search in Google Scholar

44. Malhotra, N. K., Kim, S. S., and Agarwal, J. Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 2004, pp. 336 – 355. http://doi:10.1287/isre.1040.003210.1287/isre.1040.0032 Search in Google Scholar

45. Martin, K. The Penalty for Privacy Violations: How Privacy Violations Impact Trust Online. Journal of Business Research, 82, 2018, pp. 103–116. http://doi:10.1016/j.jbusres.2017.08.03410.1016/j.jbusres.2017.08.034 Search in Google Scholar

46. Martin, K. D., Borah, A., and Palmatier, R. W. Data privacy: Effects on Customer and Firm Performance. Journal of Marketing, 81(1), 2017, pp. 36–58. http://doi:10.1509/jm.15.049710.1509/jm.15.0497 Search in Google Scholar

47. Martin, K., and Shilton, K. Why Experience Matters to Privacy: How Context-based Experience Moderate’s Consumer Privacy Expectations for Mobile Applications. Journal of the Association for Information Science and Technology, 67(8), 2015, pp. 1871–1882. http://doi:10.1002/asi.2350010.1002/asi.23500 Search in Google Scholar

48. Mathieson, K. Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior. Information Systems Research, 2(3), 1991, pp. 173–191. http://doi:10.1287/isre.2.3.17310.1287/isre.2.3.173 Search in Google Scholar

49. Meinert, D. B., Peterson, D. K., Criswell, J. R., and Crossland, M. D. Privacy Policy Statements and Consumer Willingness to Provide Personal Information. Journal of Electronic Commerce in Organizations, 4(1), 2006, pp. 1–17. http://doi:10.4018/jeco.200601010110.4018/jeco.2006010101 Search in Google Scholar

50. Metzger, M. J. Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce. Journal of computer-mediated communication, 9(4), 2004, JCMC942.10.1111/j.1083-6101.2004.tb00292.x Search in Google Scholar

51. Miltgen, C. L., Henseler, J., Gelhard, C. and Popovič, A. Introducing New Products that affect Consumer Privacy: A Mediation Model. Journal of Business Research, 69(10), 2016, pp. 4659–4666. http://doi:10.1016/j.jbusres.2016.04.01510.1016/j.jbusres.2016.04.015 Search in Google Scholar

52. Miyazaki, A. D., and Fernandez, A. Consumer Perceptions of Privacy and Security Risks for Online Shopping. Journal of Consumer Affairs, 35(1), 2001, pp. 27–44.10.1111/j.1745-6606.2001.tb00101.x Search in Google Scholar

53. Moradian, M., Modanloo, V., & Aghaiee, S. Comparative Analysis of Multi-Criteria Decision-Making Techniques for Material Selection of Brake Booster Valve Body. Journal of Traffic and Transportation Engineering (English Edition), 6(5), 2019, pp. 526-534. http://doi:10.1016/j.jtte.2018.02.00110.1016/j.jtte.2018.02.001 Search in Google Scholar

54. Nigeria Data Protection Regulation. Retrieved from https://ndpr.nitda.gov.ng/Content/Doc/NigeriaDataProtectionRegulation.pdf 2019. Search in Google Scholar

55. Norberg, P. A., and Horne, D. R. Privacy Attitudes and Privacy-related Behavior. Psychology and Marketing, 24(10), 2019, pp. 829–847. http://doi:10.1002/mar.2018610.1002/mar.20186 Search in Google Scholar

56. Nowak, G. J., & Phelps, J. Direct Marketing and the Use of Individual-level Consumer Information: Determining How and When “Privacy” Matters. Journal of Direct Marketing, 9(3), 1995, pp. 46–60. http://doi:10.1002/dir.400009030710.1002/dir.4000090307 Search in Google Scholar

57. Pavlou, P. A., and Gefen, D. Building Effective Online Marketplaces with Institution-based Trust. Information Systems Research, 15(1), 2004, pp. 37–59. http://doi:10.1287/isre.1040.001510.1287/isre.1040.0015 Search in Google Scholar

58. Peter, J. P., and Tarpey Sr, L. X. A Comparative Analysis of Three Consumer Decision Strategies. Journal of consumer research, 2(1), 1975, pp. 29-37. http://doi:10.1086/20861310.1086/208613 Search in Google Scholar

59. Phelps, J., Nowak, G., and Ferrell, E. Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing, 19(1), 2000, pp. 27–41. http://doi:10.1509/jppm.19.1.27.16941.10.1509/jppm.19.1.27.16941 Search in Google Scholar

60. Privacy and Data Security Update. Federal Trade Commission. Retrieved October 3, 2021, from https://www.ftc.gov/reports/privacy-data-security-update-2014 2014. Search in Google Scholar

61. Protection of Personal Information Act. Retrieved November 23, 2021, from https://www.gov.za/sites/default/files/gcis_document/201409/3706726-11act4of2013protectionofpersonalinforcorrect.pdf 2021 Search in Google Scholar

62. Roszkowska, E. Multi-Criteria Decision-Making Models by applying the TOPSIS Method to Crisp and Interval Data, Multiple Criteria Decision Making (6), 2011, pp. 200-230. Search in Google Scholar

63. Salehi, V., Zarei, H., Shirali, G. A., and Hajizadeh, K. An Entropy-based TOPSIS Approach for Analyzing and Assessing Crisis Management Systems in Petrochemical Industries. Journal of Loss Prevention in the Process Industries, 104241. 2020. http://doi:10.1016/j.jlp.2020.10424110.1016/j.jlp.2020.104241 Search in Google Scholar

64. Schoenbachler, D. D. and Gordon, G. L. Trust and Customer Willingness to Provide Information in Database-Driven Relationship Marketing. Journal of Interactive Marketing, 16(3), 2002, pp. 2–16. http://doi:10.1002/dir.1003310.1002/dir.10033 Search in Google Scholar

65. Sekaran, U. and Bougie, R. Research Methods for Business: A Skill Building Approach. John Wiley & Sons. 2013. Search in Google Scholar

66. Sheehan, K. B. and Hoy, M. G. Dimensions of Privacy Concern Among Online Consumers. Journal of Public Policy & Marketing, 19(1), 2000, pp.62–73. http://doi:10.1509/jppm.19.1.62.1694910.1509/jppm.19.1.62.16949 Search in Google Scholar

67. Smith, H. J. Information Privacy and Marketing: What the U.S. Should (and Shouldn’t) Learn from Europe. California Management Review, 43(2), 2001, 8–33.10.2307/41166073 Search in Google Scholar

68. Smith, H. J., Milberg, S. J. and Burke, S. J. Information Privacy: Measuring Individuals’ Concerns About Organizational Practices. MIS Quarterly, 20(2), 1996, pp. 167.10.2307/249477 Search in Google Scholar

69. Taber, K. S. The Use of Cronbach’s Alpha When Developing and Reporting Research Instruments in Science Education. Research in Science Education. 2017.10.1007/s11165-016-9602-2 Search in Google Scholar

70. Tang, Z., Hu, Y. U. and Smith, M. D. Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor. Journal of Management Information Systems, 24(4), 2008, pp. 153-173.10.2753/MIS0742-1222240406 Search in Google Scholar

71. Tatum, H. Your Data and Privacy. Ask Help Desk: No, Your Phone Isn’t Listening to Your Conversations. (2021, November 12). Seriously [Blog post]. Retrieved from https://www.washingtonpost.com/technology/2021/11/12/phone-audio-targeting-privacy/ Search in Google Scholar

72. Tavakol, M. and Dennick, R. Making Sense of Cronbach’s Alpha. International Journal of Medical Education, 2, 2011, pp. 53–55. http://doi:10.5116/ijme.4dfb.8dfd10.5116/ijme.4dfb.8dfd Search in Google Scholar

73. Tsai, J. Y., Egelman, S., Cranor, L., and Acquisti, A. The Effect of Online Privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 2011, 254–268. http://doi:10.1287/isre.1090.026010.1287/isre.1090.0260 Search in Google Scholar

74. Wakefield, R. The Influence of User Affects in Online Information Disclosure. The Journal of Strategic Information Systems, 22(2), 2013, pp.157–174. http://doi:10.1016/j.jsis.2013.01.00310.1016/j.jsis.2013.01.003 Search in Google Scholar

75. World Economic Forum. The Global Information Technology Report Retrieved from http://www3.weforum.org/docs/GITR2016/WEF_GITR_Full_Report.pdf 2016. Search in Google Scholar

76. Xu, H., Dinev, T., Smith, H. J., and Hart, P. Examining the Formation of Individual’s Information Privacy Concerns: Toward an Integrative View, in Proceedings of 29th International Conference on Information Systems, Paris, France, 14-17, 2008. Retrieved from https://faculty.ist.psu.edu/xu/papers/conference/icis08a.pdf Search in Google Scholar

77. Xu, H., Teo, H.-H., Tan, B. C. Y., and Agarwal, R. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-based Services. Journal of Management Information Systems, 26(3), 2009, pp. 135–174. http://doi:10.2753/mis0742-122226030510.2753/MIS0742-1222260305 Search in Google Scholar

78. Zou, Z., Yun, Y., and Sun, J. Entropy Method for Determination of Weight of Evaluating Indicators in Fuzzy Synthetic Evaluation for Water Quality Assessment. Journal of Environmental Sciences, 18(5), 2006, pp. 1020–1023. http://doi:10.1016/s1001-0742(06)60032-610.1016/S1001-0742(06)60032-6 Search in Google Scholar

eISSN:
2299-0518
Język:
Angielski
Częstotliwość wydawania:
4 razy w roku
Dziedziny czasopisma:
Business and Economics, Political Economics, other, Mathematics, Logic and Set Theory, Philosophy